By Topic

Computer and Communication Technology (ICCCT), 2012 Third International Conference on

Date 23-25 Nov. 2012

Filter Results

Displaying Results 1 - 25 of 78
  • [Cover art]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (11757 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (156 KB)
    Freely Available from IEEE
  • Message from General Chair and the International Chairs

    Publication Year: 2012, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (79 KB) | HTML iconHTML
    Freely Available from IEEE
  • Privacy preservation in context aware systems: Overview and applications

    Publication Year: 2012, Page(s): xix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (85 KB)

    Summary form only given, as follows. Advent of 4 G networks, IPv6 and increasing number of subscribers indicate that each mobile device will have its own IP address and virtually become a hotspot. In the coming years, systems that track and record our movements will indispensably be integrated in our everyday life. Location-based systems: dashboard navigation systems, Internet enabled smartphones ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Ontology-Based Topical Crawling Algorithm for Accessing Deep Web Content

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    Due to the large volume of the Web information and relatively high speed of information update, the coverage and quality of the retrieved pages by modern search engines is comparatively small. Given the volume of the Web and its frequency of content change, the coverage and quality of pages retrieved by modern search engines is relatively small since they crawl only hypertext links ignoring the se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Mining: A New Approach for Data Mining Based on Texture

    Publication Year: 2012, Page(s):7 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    Image data mining can be done manually by slicing and dicing the data until a pattern becomes obvious. Or, it can be done with programs that analyse the data automatically. Colour, texture and shape of an image have been primitive image descriptors in Content Based Image Retrieval (CBIR) system. Primitive features of an image used to identify and retrieve closely matched images from an image datab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decision Making through Multi Rule Algorithm: An Extension to 1 Rule Algorithm

    Publication Year: 2012, Page(s):10 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    Mining is a process of searching data in huge database to infer useful information and deduces relationships and patterns. Though we can predict certain patterns from our database manually, but as soon as size of data increases (becomes in terabytes) it becomes difficult and tedious to deduce the important information from huge database (or data warehouse). Various data-mining algorithms exist to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User Centric Retrieval of Learning Objects in LMS

    Publication Year: 2012, Page(s):14 - 19
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (399 KB) | HTML iconHTML

    Research and Academic Institutions own and archive a great number of documents like lesson plan, study material and research related resources, which are needed to be stored and used over for a longer period of time by lecturers and researchers. In order to achieve this it is required to convert these educational resources into Learning Objects and store them in structured & meaningful way via... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web Pre-fetching at Proxy Server Using Sequential Data Mining

    Publication Year: 2012, Page(s):20 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (610 KB) | HTML iconHTML

    Reducing latency for accessing web objects is a major challenge in Proxy Server and various techniques such as web caching and Web pre-fetching is used for it. In this paper we have integrated the approach of web caching and pre-fetching using sequential data mining techniques to enhance the proxy server's performance. The web access logs collected at squid proxy servers, can be used derive intere... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects

    Publication Year: 2012, Page(s):26 - 32
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    Privacy preserving has originated as an important concern with reference to the success of the data mining. Privacy preserving data mining (PPDM) deals with protecting the privacy of individual data or sensitive knowledge without sacrificing the utility of the data. People have become well aware of the privacy intrusions on their personal data and are very reluctant to share their sensitive inform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Combined Architecture for FDCT Algorithm

    Publication Year: 2012, Page(s):33 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (393 KB) | HTML iconHTML

    A single generalized architecture has been deviced which can perform 4 FDCT algorithms namely, Arai's, Chen's, Loeffler's and Vetterli's by varying the control signals. Simulink files containing block design files of 4 FDCT algorithms are included. From the Simulink file appropriate language (VHDL) for the target board (FPGA) can be generated. The VHDL code is run in MODELSIM XE III/Starter 6.1e-c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Adaptive Locality Based Maintenance of Correlated Data

    Publication Year: 2012, Page(s):38 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB) | HTML iconHTML

    Operations performed in a Binary Search Tree generally starts from root node. As result search space (total number of nodes) constitutes entire tree, where a normal users intention is only certain part of the tree. In this paper we propose a noble method for performing operations such as insertion, deletion and retrieval within the local search space of a lookup node rather than the root node. To ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel Single Input Five Output Voltage Mode Universal Filter Based on DDCCTA

    Publication Year: 2012, Page(s):46 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    A novel single input five output voltage mode universal filter based on differential difference current conveyor transconductance amplifier (DDCCTA) is presented. It employs grounded passive components namely two capacitors and a resistor. The proposed filter offers the following advantageous features: high input impedance-a desirable property of voltage mode filters; simultaneous availability of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Time Error Estimation Technique for OFDM System

    Publication Year: 2012, Page(s):52 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB) | HTML iconHTML

    OFDM based systems are extremely sensitive to time and frequency synchronization errors. This paper addresses the issue of time synchronization. In this paper we are presenting a simple and novel technique for time synchronization. The time synchronization error causes Inter Symbol Interference and hence must be corrected at receiver. In many wireless communication systems, the data packets or fra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Variability Analysis of MTJ-Based Circuit

    Publication Year: 2012, Page(s):57 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    This paper presents a study of MTJ-based logic circuit in terms of propagation delay, power dissipation, and power-delay product. The paper also analyzes impact of PVT process, voltage, and temperature) variations on most of the design metrics of logic circuit and compares the results with hose conventional CMOS logic circuit. The MTJ-based logic circuit are found to be robust compared with conven... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Voltage Mode Single OTRA Based Biquadratic Filters

    Publication Year: 2012, Page(s):63 - 66
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (181 KB) | HTML iconHTML

    In this paper, single operational transresistance amplifier (OTRA) based biquadratic filter configuration is proposed. The topology can be used to synthesize low pass, high pass and band pass filter functions with appropriate admittance choices. This configuration can implement filters with high quality factor which can be controlled independent of angular frequency. Workability of the proposed bi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error Estimation Using Correlator for OFDM Based Wireless Communication System

    Publication Year: 2012, Page(s):67 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (483 KB) | HTML iconHTML

    Nowadays, correlator is a crucial part of communication systems. The correlation function has a great practical importance when it is necessary to process a signal in the presence of noise. Use of correlator in modern communication system have more precise frequency and timing synchronization, which improves its ability against interference of multipath and frequency selective fading channels. Eve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Realization of DVCCCTA Based Mutually Coupled Circuit

    Publication Year: 2012, Page(s):73 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    This paper presents Differential Voltage Current Controlled Conveyor Transconductance Amplifier (DVCCCTA) based realization of floating mutually coupled circuit. It employs only three DVCCCTAs and three grounded capacitors. The attractive feature of the circuit is independent and electronic control of primary, secondary and mutual inductance values. The proposed circuit is also analyzed for non id... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MOS-C Third Order Quadrature Oscillator Using OTRA

    Publication Year: 2012, Page(s):77 - 80
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (149 KB) | HTML iconHTML

    In this paper a voltage mode third order quadrature oscillator is proposed. The proposed filter is suitable for MOS-C implementation making oscillation frequency electronically tunable. The non-ideality analysis of the circuit is also given and for high frequency applications self compensation can be used. PSPICE simulations have been included to demonstrate the workability of the proposed quadrat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systematic Study of Binocular Depth Finding Using Two Web Cameras

    Publication Year: 2012, Page(s):88 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB) | HTML iconHTML

    A stereovision sensor system for depth measurement has been developed in our department. Stereo cameras attached to a robot can perform several tasks effectively, such as calculating distance of an object or that of a person by using depth map, which can further lead to achieve a bigger goal of grasping or manipulation of objects. We have calibrated the cameras and applied rectification algorithm ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mouse Cursor Control System Based on Facial Electromyogram and Mechanomyogram

    Publication Year: 2012, Page(s):90 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    This paper reports the development of a mouse cursor control system as an assistive technology for upper arm amputees. The control is based on facial electromyogram (fEMG) and mechanomyogram (MMG) signals. The fEMG and MMG signals are collected for six words from eight subjects. A reference signal has been simulated based on the mean values of the signals representing the six words. The Euclidian ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reduced Variable Neighbourhood Search for Pagenumber Minimization Problem

    Publication Year: 2012, Page(s):92 - 97
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    In this paper we apply reduced variable neighbourhood search (RVNS) to the page number minimization problem (PNP). In RVNS, random depth first search of the graph is used for placing the vertices on the spine and three edge embedding heuristics are used to distribute the edges on a minimal number of pages. The results show that the algorithm achieves the optimal page number for most of the standar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.